Internet, E Mail and
Electronic Communication Policy
This policy is twenty-three (23) page in length, is compliant with all recent legislation (SOX, HIPAA, Patriot Act, and Sensitive information), and covers:
- Appropriate use of equipment
- Internet access
- Electronic Mail
- Retention of e-mail on personal systems
- E-mail and business records retention
- Copyrighted materials
- Banned activities
- Ownership of information
Included with the policy are forms that can be used to facilitate the implementation of the policy. Included are these ready to use forms:
- Internet & Electronic Communication Employee Acknowledgement (short form)
- E-Mail - Employee Acknowledgement (short form)
- Internet Use Approval Form
- Internet Access Request Form
- Security Access Application Form
The WORD template uses the latest CSS style sheet and can easily be modified to conform to the style used in your enterprise policy manual.
Latest Policy News
Campus secuirty driven by last year's eventsJanuary 14th, 2015
In the past year, we've seen a number of trends emerge in campus security at both the higher education and K-12 level, as U.S. school districts and universities enhance their security measures. On the K-12 level, much of this activity is being driven by the tragic shootings at Sandy Hook Elementary School and other similar events. In higher education, the Clery Act continues to be one of the primary drivers of change. Both education segments and analyze the most significant security trends taking place in each.
Security Manual Template
Policy and Procedure Manual
Compliance Management Made Easy
ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant
Supports Meaningful Use Compliant Stage Implementation
Includes PCI DSS Audit Program
Many organizations fail to realize the benefits of security information management due to the often exhaustive financial and human resource costs of implementing and maintaining the software. However, Janco's' Security Manual Template - the industry standard - provides the infrastructure tools to manage security, make smarter security decisions and respond faster to security incidents and compliance requests within days of implementation. The template provides a framework for evaluating SIM services and shows how they could be applied within your organization.- more info
Even with improved IT job market layoffs continue - 600 at QualcommDecember 10th, 2014
Qualcomm is laying off roughly 600 employees worldwide, as it plans to refocus its business into new areas, a company spokesperson confirmed to CNET on Tuesday.
Qualcomm said 300 employees would be cut in California, where the company has its San Diego headquarters and several other offices. A "similar number" of international employees will also be laid off. At the end of September, Qualcomm had about 31,300 full-time, part-time and temporary employees, up about 300 from the year earlier, according to regulatory filings.more info
CIO concerns when creating business continuity plansNovember 27th, 2014
Disasters Happen - Business Continuity Disaster Recovery How do you balance the business continuity disaster recovery risk and investment equation? Is the potential risk greater than the investment? The facts are: 43% of companies experiencing disasters never reopen, and 29% Continue readingmore info - more info
Disaster Planning has been impacted by EbolaOctober 23rd, 2014
Ebola shows how exotic threats filed in the it will never happen folder can impact anyone and cause major disruption.
Another such threat is from Solar flares traveling from the sun to the earth which contain massive amounts of energy can disrupt electronic systems. This along with a man made high altitude electromagnetic pulse could be just as devastating as solar storms.
The question for business continuity managers is how can we prepare for these events? Is it possible to build a business continuity and/or disaster recovery plan that addresses a long-term power outage and inability to operate most electronic devices?more info
Cloud Computig shifts computing model for many corporatrionsSeptember 3rd, 2014
Cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is not whether the cloud is part of their infrastructure plans, but which applications and workloads to move to the cloud and when. But even as the benefits of cloud and hosted models have become apparent, concerns persist about security, and an assumption lingers that the cloud is inherently less secure than an enterprise data center environment.more info
Infrastructure updates planned for 2015 by CIOsAugust 19th, 2014
- Legacy systems need to be able to be accessed via the cloud and be available for BYOD
- Bridge the gap between the IT application infrastructure and security compliance requirements
- Focus on gaining competitive advantages and improving productivity at the same time
New Net Neutrality Rules Will Increase the Size of the FCCApril 24th, 2014
The U.S. Federal Communications Commission (FCC) proposed new rules for net neutrality that will increase the federal bureaucracy and government oversight of the internet.
The FCC proposed new net neutrality rules that will allow broadband providers to charge companies like Netflix for preferential traffic management, according to a news report.
The FCC's proposal would prohibit broadband providers from slowing down or blocking traffic to specific websites, but allow them to give some traffic preferential treatment based on commercially reasonable terms. The FCC would determine what's commercially reasonably on a case-by-case basis.
You can get all of Janco's templates in its IT Management Suite. When you do that you save over $2,500 and when implemented your enterprise is positioned to have a "WORLD CLASS" Information Technology function. You will be in compliance with all mandated requirements including all US and International requirements.
- IT Management Suite (CIO and CTO Special offer) - Save over $2,500
Hackers are attacking mobile devicesApril 2nd, 2014
Primarily because mobile device applications have the potential to interact with confidential or sensitive information, many organizations see this area as a primary technology challenge to address and a main focus for security initiatives. Hackers have taken notice to this fact and have started targeting these mobile applications - which can ultimately lead to decreased trust in an application or an organization that uses it.
- Mobility Policy Bundle (more info...) All of the policies below are included as individual MS Word files and a single PDF file. Electronic forms are all individual documents that are easily modifiable
- BYOD Policy Template (more info...) Includes electronic BYOD Access and Use Agreement Form
- Mobile Device Access and Use Policy (more info...)
- Record Management, Retention, and Destruction Policy (more info...)
- Social Networking Policy (more info...) Includes electronic form
- Telecommuting Policy (more info...) Includes 3 electronic forms to help to effectively manage work at home staff
- Travel and Off-Site Meeting Policy (more info...)
Disaster Recovery DigestFebruary 20th, 2014
Disaster Recovery Digest
- Google data center security & disaster recovery This is a great video on physical security as well as the the software security. This is a great primer which all CIOs and Data...
- 10 best practices for cloud disaster recovery Cloud Disaster Recovery 10 Best Practices Creating out a complete cloud disaster recovery infrastructure can be cost prohibitive for many organizations. Ten best practices are:...
- Will your disaster recovery provider be in business when you need them? Disaster Recovery plans that depend on outsourcers face significant additional risk What if your were in Florida and the Hurricane season was in full swing...
- Options for a data center disaster recovery strategy Data Center disaster recovery strategy options A critical component of a disaster recovery business continuity is the data center disaster recovery strategy Hot...
- Infrastructure Key to Data Center Management and Disaster Recovery Infrastructure is key to data center management Data Center Management Issues Your data centers are stuck in a rut. While 90 per cent have...
Physical and digital security are the focus of CSOsFebruary 12th, 2014
The migration of physical security technology to a network platform has made it easier and more convenient for the CSO and their organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.
Open architecture further enables central control of the various security systems on a single platform, providing higher levels of operational efficiency across the enterprise as well as improved standardization of policies and procedures.more info